Security

Security news, trends, analysis and practical advice

Legal law gavel hammer courts
ios 9.3

bitcoin on keyboard

Blockchain: It's not just for finance anymore

Blockchain powers virtual cryptocurrencies like Bitcoin. But despite its reputation as a financial technology platform it may prove to be highly valuable outside of finance, and particularly in the emerging world of mission-critical...

anil chakravarthy Informatica

Informatica CEO: 'Data security is an unsolved problem'

Companies today are awash in data, but current tools and processes are not enabling them to keep it secure. That's according to Informatica CEO Anil Chakravarthy, whose says his company is embarking on a major push to go further into...

20151005 Cisco headquarters sign

Cisco starts patching firewall devices against NSA-linked exploit

Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S. National Security Agency.

Facebook gambles $16 billion on WhatsApp

Facebook will use Whatsapp users' personal data to target ads

Two years after its acquisition by Facebook, WhatsApp is changing its privacy policy to allow it to share more information about its mobile app users with its owner.

hacker hacked security risk

So your company’s been hacked: How to handle the aftermath

Education and planning are key, cyber-security expert Tyler Cohen Wood says.

hacker matrix hacking

Lost and stolen devices account for 1 in 4 breaches in the financial services sector

We often hear about the risks of data breaches, but it's interesting to look at some root cause statistics.

Spying with binoculars

HP's Sure View -- protecting your laptop screen from prying eyes

HP along with 3M has come out with an integrated solution that stops the person sitting next to you in your friendly neighborhood Starbucks from snooping on what you're doing on your computer.

social media profile user chat twitter conversation

Proposed ‘social media ID, please' law draws outrage

A plan by the U.S. government to require some foreign travelers to provide their social media IDs on key travel documents is drawing outrage from group who call it un-American.

dsc05255

Android botnet relies on Twitter for commands

Twitter users aren’t the only ones checking the microblogging service for important updates. Android malware is starting to do so, too.

video

Security Sessions: The pitfalls of security awareness training

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Bill Rosenthal, CEO of Logical Operations, about what's missing in many security awareness training programs that enterprises often deploy (if...

security code big data cyberespionage byte

Hackers use vBulletin flaw to break into 27M more accounts

A vulnerability in a widely-used internet forum software is becoming a go-to method for hackers to steal data.

aerial view of baltimore

Baltimore cops using private company's aerial cameras to conduct secret surveillance

Persistent Surveillance Systems mount cameras on a Cessna and fly for hours above Baltimore to conduct surveillance likened to Google Earth with TiVo capabilities; Baltimore police have not publicly disclosed the unblinking...

Spying

NY Times says Moscow bureau was targeted by cyberattack

The Moscow bureau of The New York Times was the target of a cyberattack, though there are no indications yet that the hackers were successful, according to the newspaper.

customers shoppers ts

19% of shoppers would abandon a retailer that’s been hacked

Nearly a fifth of shoppers would avoid at a retailer that has been a victim of a cybersecurity hack.

team teamwork global workforce

How to get your network and security teams working together

Your network and security teams may have different goals and objectives, but as networks grow more complex, it’s time to get these two teams on the same page to help avoid miscommunication around security threats.

Free course: Responding to cybersecurity incidents

Training provider Logical Operations, in partnership with IDG Enterprise, offers a free online course to get you up to speed on how to respond to cybersecurity incidents.

third party threats

Third-party vendors -- your weakest link?

Third parties continue to pose an unmanaged risk for many businesses, and they continue to be exposed to hacking and regulatory fines as a result. Learn why third party risk must be properly managed, and discover tips and suggestions...

NSA headquarters

Alleged NSA hackers probably gave away a small fortune by leaking exploits

Anonymous hackers probably gave away hundreds of thousands of dollars in potential sales when they leaked valuable cyberweapons allegedly stolen from the National Security Agency.

Load More